Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
313s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:32
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral26/memory/4592-1-0x0000000000C80000-0x0000000000CEC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 14 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1344 Client.exe 1108 Client.exe 4904 Client.exe 1556 Client.exe 4520 Client.exe 1900 Client.exe 1984 Client.exe 3812 Client.exe 2412 Client.exe 1156 Client.exe 2832 Client.exe 4232 Client.exe 1728 Client.exe 2712 Client.exe -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 37 ip-api.com 18 ip-api.com 28 ip-api.com 31 ip-api.com 33 ip-api.com 12 ip-api.com 14 ip-api.com 23 ip-api.com 25 ip-api.com 35 ip-api.com 20 ip-api.com 2 ip-api.com 10 api.ipify.org 16 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2420 1344 WerFault.exe Client.exe 1972 1108 WerFault.exe Client.exe 2160 4904 WerFault.exe Client.exe 4460 1556 WerFault.exe Client.exe 1964 4520 WerFault.exe Client.exe 5096 1900 WerFault.exe Client.exe 1680 1984 WerFault.exe Client.exe 4460 3812 WerFault.exe Client.exe 4048 2412 WerFault.exe Client.exe 3168 1156 WerFault.exe Client.exe 960 2832 WerFault.exe Client.exe 5060 4232 WerFault.exe Client.exe 4368 1728 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2836 SCHTASKS.exe 3748 schtasks.exe 5048 schtasks.exe 1748 schtasks.exe 1956 schtasks.exe 4924 schtasks.exe 2560 schtasks.exe 4460 schtasks.exe 1660 schtasks.exe 3796 schtasks.exe 4172 schtasks.exe 3312 schtasks.exe 1472 schtasks.exe 804 schtasks.exe 1876 schtasks.exe -
Runs ping.exe 1 TTPs 13 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4072 PING.EXE 3008 PING.EXE 2792 PING.EXE 736 PING.EXE 1396 PING.EXE 1836 PING.EXE 3216 PING.EXE 736 PING.EXE 4960 PING.EXE 1596 PING.EXE 2584 PING.EXE 3756 PING.EXE 3240 PING.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
Uni - Copy (103) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 4592 Uni - Copy (103) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 1344 Client.exe Token: SeDebugPrivilege 1108 Client.exe Token: SeDebugPrivilege 4904 Client.exe Token: SeDebugPrivilege 1556 Client.exe Token: SeDebugPrivilege 4520 Client.exe Token: SeDebugPrivilege 1900 Client.exe Token: SeDebugPrivilege 1984 Client.exe Token: SeDebugPrivilege 3812 Client.exe Token: SeDebugPrivilege 2412 Client.exe Token: SeDebugPrivilege 1156 Client.exe Token: SeDebugPrivilege 2832 Client.exe Token: SeDebugPrivilege 4232 Client.exe Token: SeDebugPrivilege 1728 Client.exe Token: SeDebugPrivilege 2712 Client.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1344 Client.exe 1108 Client.exe 4904 Client.exe 1556 Client.exe 4520 Client.exe 1900 Client.exe 1984 Client.exe 3812 Client.exe 2412 Client.exe 1156 Client.exe 2832 Client.exe 4232 Client.exe 1728 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (103) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 4592 wrote to memory of 1660 4592 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 4592 wrote to memory of 1660 4592 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 4592 wrote to memory of 1660 4592 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 4592 wrote to memory of 1344 4592 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 4592 wrote to memory of 1344 4592 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 4592 wrote to memory of 1344 4592 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 4592 wrote to memory of 2836 4592 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4592 wrote to memory of 2836 4592 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4592 wrote to memory of 2836 4592 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1344 wrote to memory of 4172 1344 Client.exe schtasks.exe PID 1344 wrote to memory of 4172 1344 Client.exe schtasks.exe PID 1344 wrote to memory of 4172 1344 Client.exe schtasks.exe PID 1344 wrote to memory of 2036 1344 Client.exe cmd.exe PID 1344 wrote to memory of 2036 1344 Client.exe cmd.exe PID 1344 wrote to memory of 2036 1344 Client.exe cmd.exe PID 2036 wrote to memory of 4728 2036 cmd.exe chcp.com PID 2036 wrote to memory of 4728 2036 cmd.exe chcp.com PID 2036 wrote to memory of 4728 2036 cmd.exe chcp.com PID 2036 wrote to memory of 2792 2036 cmd.exe PING.EXE PID 2036 wrote to memory of 2792 2036 cmd.exe PING.EXE PID 2036 wrote to memory of 2792 2036 cmd.exe PING.EXE PID 2036 wrote to memory of 1108 2036 cmd.exe Client.exe PID 2036 wrote to memory of 1108 2036 cmd.exe Client.exe PID 2036 wrote to memory of 1108 2036 cmd.exe Client.exe PID 1108 wrote to memory of 3748 1108 Client.exe schtasks.exe PID 1108 wrote to memory of 3748 1108 Client.exe schtasks.exe PID 1108 wrote to memory of 3748 1108 Client.exe schtasks.exe PID 1108 wrote to memory of 2976 1108 Client.exe cmd.exe PID 1108 wrote to memory of 2976 1108 Client.exe cmd.exe PID 1108 wrote to memory of 2976 1108 Client.exe cmd.exe PID 2976 wrote to memory of 4092 2976 cmd.exe chcp.com PID 2976 wrote to memory of 4092 2976 cmd.exe chcp.com PID 2976 wrote to memory of 4092 2976 cmd.exe chcp.com PID 2976 wrote to memory of 4960 2976 cmd.exe PING.EXE PID 2976 wrote to memory of 4960 2976 cmd.exe PING.EXE PID 2976 wrote to memory of 4960 2976 cmd.exe PING.EXE PID 2976 wrote to memory of 4904 2976 cmd.exe Client.exe PID 2976 wrote to memory of 4904 2976 cmd.exe Client.exe PID 2976 wrote to memory of 4904 2976 cmd.exe Client.exe PID 4904 wrote to memory of 4924 4904 Client.exe schtasks.exe PID 4904 wrote to memory of 4924 4904 Client.exe schtasks.exe PID 4904 wrote to memory of 4924 4904 Client.exe schtasks.exe PID 4904 wrote to memory of 3408 4904 Client.exe cmd.exe PID 4904 wrote to memory of 3408 4904 Client.exe cmd.exe PID 4904 wrote to memory of 3408 4904 Client.exe cmd.exe PID 3408 wrote to memory of 1892 3408 cmd.exe chcp.com PID 3408 wrote to memory of 1892 3408 cmd.exe chcp.com PID 3408 wrote to memory of 1892 3408 cmd.exe chcp.com PID 3408 wrote to memory of 736 3408 cmd.exe PING.EXE PID 3408 wrote to memory of 736 3408 cmd.exe PING.EXE PID 3408 wrote to memory of 736 3408 cmd.exe PING.EXE PID 3408 wrote to memory of 1556 3408 cmd.exe Client.exe PID 3408 wrote to memory of 1556 3408 cmd.exe Client.exe PID 3408 wrote to memory of 1556 3408 cmd.exe Client.exe PID 1556 wrote to memory of 3796 1556 Client.exe schtasks.exe PID 1556 wrote to memory of 3796 1556 Client.exe schtasks.exe PID 1556 wrote to memory of 3796 1556 Client.exe schtasks.exe PID 1556 wrote to memory of 2328 1556 Client.exe cmd.exe PID 1556 wrote to memory of 2328 1556 Client.exe cmd.exe PID 1556 wrote to memory of 2328 1556 Client.exe cmd.exe PID 2328 wrote to memory of 2836 2328 cmd.exe chcp.com PID 2328 wrote to memory of 2836 2328 cmd.exe chcp.com PID 2328 wrote to memory of 2836 2328 cmd.exe chcp.com PID 2328 wrote to memory of 1396 2328 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Vu734we2OULJ.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yFdS4VolOjWz.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E1aqvcsU9aj4.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iRqknNNzZiaK.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LNtx0poCiPiI.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DyU6sl6onPFx.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zyOBIYGGGkWF.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OI6qVMGhkA01.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BwaCQjDre3Qg.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dpCBHwA7FKTx.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VQnK8sRjLK0c.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8MqXMKswU28b.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LataZ2zo82mB.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 170827⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 173225⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 109223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 174821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 218019⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 172417⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 170015⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 223213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 224011⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 17209⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 22487⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 22365⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 16803⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (103) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1344 -ip 13441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1108 -ip 11081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4904 -ip 49041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 1556 -ip 15561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4520 -ip 45201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1900 -ip 19001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1984 -ip 19841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3812 -ip 38121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2412 -ip 24121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1156 -ip 11561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2832 -ip 28321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4232 -ip 42321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1728 -ip 17281⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8MqXMKswU28b.batFilesize
207B
MD59e4c99f8d8294c8505b6e246de85a9f5
SHA1c7516450fc9e4ad4825e41f54d5cdc11975f2bbd
SHA256048b5589cbbbb96b4e924183de80b834cb55f9d99839866148c373df423ba7fe
SHA5121ae8c48a12deab858e38375a3bcab57510e476336cce9b0928a25ad240c488170684677bce77549a97cef8858e9bf33e47a57165f11f11d2380d29517d9067a1
-
C:\Users\Admin\AppData\Local\Temp\BwaCQjDre3Qg.batFilesize
207B
MD5ada6f7246bbc70ebf02c0d2c267e7c69
SHA1b3078767a06eb5b98f1aeef8ab1699a788d7cccb
SHA2560d3fd1cbce9888f364bd14fc72a4fedbc3ea630286e6650ccd24eb9e34505189
SHA51214e226c54518140f22576282a4c3220e992d6fa5fc8b9ef9ca49ffde764ad91fd07a67e7a34a6aa6ed00ea005cd348595da58277c7beaec8551baaca143f288b
-
C:\Users\Admin\AppData\Local\Temp\DyU6sl6onPFx.batFilesize
207B
MD5dd9de4defc21e2dc54dd565a217eded3
SHA1a68b5bdbe87ddbcb259b05e5efe45e26395b6c2b
SHA256aa298c99ded14fdc81a44f7ab731ffdb295b9dc54bbaea4abe8822d248ac9139
SHA51241a933595f78d7d4234ffac445b5c566fde60b43c6b7bc5b08920d027fd07cedcfec00f2ba6fecf4e9ac47452fdc3cf75358fca555503f6a34d098e002e0f7e0
-
C:\Users\Admin\AppData\Local\Temp\E1aqvcsU9aj4.batFilesize
207B
MD52f2d3da11850ac74a01410fd124fb3ae
SHA163bd04fe4507d00a44b8b2474c0c986ebcdf91dd
SHA256673d75050e942a7e7a068a9f641217a202aa3b0fbe3a88866117d8d425d9e694
SHA5124461abbbac0dac733b563d199f130aaf6490372365879724f14cc7a441862363c151501b7afb16da522429fe8ef6ef38f90f40c19d378261fdf15416d5e07b80
-
C:\Users\Admin\AppData\Local\Temp\LNtx0poCiPiI.batFilesize
207B
MD56897926074c9900ad7e423c4507b5d74
SHA1c3c100dbf7aa6b3a025a8a15a94d0b11c3ead5f2
SHA25686a838d8f1474c8de577497693458545ea0ceff50b990c1f2b52dcd3142d8467
SHA512dfea7cce6aae59950130bb9ab73fa89462e0b879d2eb5eb7db92dd021cf67a28f2fd2e28a506200507e9d6dd928d3998901f2040b7dcf88b3fa1677211f02897
-
C:\Users\Admin\AppData\Local\Temp\LataZ2zo82mB.batFilesize
207B
MD5a75835aab28ec7f5ca674eff57324150
SHA1cfd3848d353f6d9b304ff7fc8e3eeefa01a93cc7
SHA256b638b7b32d0b205df732b8f7cd196ec9363969b7699dc6ea7902fb61114cb246
SHA512688926df92d00126e2f9babc517f3fddafbca345dd2e03e71fec722aee5bd6292c1a7c83c42896aff968824e43320c5159d6b48aff89e4ea4235acade64e53d6
-
C:\Users\Admin\AppData\Local\Temp\OI6qVMGhkA01.batFilesize
207B
MD5737cce646781fef14dcce90bf2787a6d
SHA10bdbabc9ed5deebccecdfa45fd028faca4f741f4
SHA256c51e33d65b88e749a69a9d9135af8e582f58f9e88f28adbb6bd82f8259607964
SHA51260de1cdca3cd67477d8a132710af6bee6d7a52a8b6fc44105029b252845bfcf5c48520a183999425fe5531c4935aa580f5fc3f2471292142e491be18609596dc
-
C:\Users\Admin\AppData\Local\Temp\VQnK8sRjLK0c.batFilesize
207B
MD50a5e2fdb1e83bce45557ef844436cdc7
SHA14898d8b88b2d3e539de3dceccb554212f99b00fc
SHA25609aca1a4c57b9c20b1587edb0a8152511d4f30ad42c79663fe3eccb96777edc7
SHA512fdc3dd3ad6c6a0134041419f4d7b2e5bdab73f1df350af95ccf05dedb950d9db4e5e4397fb5f9341aeb8a6f9d4d1d519833dd6998cdbafd1927ce25f0afb71b6
-
C:\Users\Admin\AppData\Local\Temp\Vu734we2OULJ.batFilesize
207B
MD535f55b2fde4a22bb9b9885b27606cccf
SHA18fe9e796d1116fd3f227a29f1a8d796e730e26ec
SHA25601a7aea4af0e4b3cedd093ea4d8403bd02b8ee88455e7d9edbee15b8fd262bc7
SHA5123d9fa5eb9f967cc002a8a235274d2a4448b1a0353a579226ddb580ac71c5ed74ef8a4324df7efc397ab455e12265b1c342edd697ee62d4bb70cfa814e67b55a0
-
C:\Users\Admin\AppData\Local\Temp\dpCBHwA7FKTx.batFilesize
207B
MD53dfbba1ccf4dcf6e8a5d26820dd39cb3
SHA11c3a0bded719df9f021a99c0514df6aede6d7f8f
SHA25641a9d3eeb199aa12e2d838092e4e0577fa594d988d0c9ce55db45b3056831e20
SHA512e82f1ea11cbba1830fc2311f5eafb11d0f2fc2a4b79f35038a330f5e02dce97a3ba2990a979d6d474c2004629da54504f520f4803cc29c25d00621fc14b13eb1
-
C:\Users\Admin\AppData\Local\Temp\iRqknNNzZiaK.batFilesize
207B
MD5f296d7ad0562a3c997f8e2ec0e2fabdd
SHA12e97122f1ceb990757e56dd282b34830ddcba0d0
SHA25622d39e6a9954fe3459e954d0eae5976a65b5feaede5eaf89b258e32a71991f16
SHA512dc62c9f47bdb35dc711f8c3d733c84605fb428ed2c936f27d822284dc850b435f5e5f8710ba4b6ea47f3e3f909dbb682c8574e2679f7389827768a6eb2f4bf30
-
C:\Users\Admin\AppData\Local\Temp\yFdS4VolOjWz.batFilesize
207B
MD5b29929c71bf66aff827d5f1a0912b15c
SHA1facdb738f21b6bdd6cbe04e16d444bded9a783c6
SHA25601bf86b535ef0fd76e74543c15b081bdd204dd02482457f248866ab85dc414d2
SHA51292c0ab288bd355a0096c9c5e629930ad1b2564330fe0bae79901b156c623f918753b122402a3b7ccd8c6fcdfc3af4f636ecd1e5264e8e9af8dc0395002194d60
-
C:\Users\Admin\AppData\Local\Temp\zyOBIYGGGkWF.batFilesize
207B
MD5b7d9d8d3c33e5ffd26d646d8e7572dcb
SHA1d92234fdd7f1d343a2357ed1f09c7f293c12f7c7
SHA256a1809f6c7acddc05f0d44316bc31cd83fbf7b19694aac1e3cb4c3cc460d4d295
SHA512c4d9778333278b05b8eab0ec2b1cff2e404df707ecd45efa58a506b3bf45c2ce1f579bc57061a606c028a7b25ef2efd776ba0980f4f767acf23480a844a6db4a
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD50f22b3e9adc37eca2e3f4e4421c90584
SHA13c98f7d4921d456e1fef0536bab075b7dd6802a9
SHA256bfd09b125977f800373eaffe18c8a5700c3fb3a652be082cb1daeb6da3e1bca9
SHA512e9d6c666c14345b83d6ae25af69e3a9d92c90920815db2c1a0e09983b675339cfcad4e631f17a98ce171cff614b335061579f4c879812d50480a5ae71e638b83
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD51ddc66fc9c73db07581bd838d85fcf4d
SHA1f5ab114008a4594c7ea72a7b24d1aec4e0e79536
SHA256e9d22af378ed71e9cff342c63f9fdc65c9fc49988fe8fd6b47c640d873627184
SHA512de1626a99b3087555011921f4721c1dea8757a3b914731120889198ca8dc6e6ec5db85884a31e730d799ca5caa8439b8b4554914fcad08f13105487550e5b8c1
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5d9e5369dbff16d693563dffaf11a2ce7
SHA1fde9c7420a2ab7efc6d80d802102df9e6867168d
SHA256c61e9e9290eb86f1c422ea60465cded7065f935691a0be30837fb62abe2a14a3
SHA5124bc4afdd7ec2031e79babc7bc0b6bdb8ad8fa684e3198a21b029488545141093a61447d5553d973f740885fdb84ebf7e214c91c6672ebbbbae129916033146ed
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD59262161f4352c63a61e1df9130ed2a86
SHA12de05636d466f82be615d507f284964ab185f796
SHA25649e65fb881d6b6fe6851d10b325fa325fc0fb5a4ec47c7e8c11f2f3fcd4ee1f5
SHA51284c5ba0dcc6318be42a5ca41f3c8dc6db616caac8a57de6bdac8a83c69a7f148c623ccc68e60ac439c8bb48446dd5f9482c0fb06e2f6a7be0a306525042139a4
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD59e04868ba28b2548ca5652e484ac3bfc
SHA1bdc3919339f96aaca110cf4bcab5636950be89ae
SHA2566d620485d3a3a46086a2c378062fb51110bed9594c42fca35bf52acacfaa7066
SHA512952c0dfef770dc430e9f3a617c9c3fa8aa634591b50054b55e87c73d045adcbc6b24760b6ee8f46c8e765dc3eda2992d7f364188f961d67e339ecac876ae79aa
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5732f0ed09de35d97cf8252a737f43b96
SHA16305f8435bca3550912417f7be6e766c7ebf6b32
SHA256e087cb24144e75ab1c50dccd34493a2c7064f5aa1445f4d35d9620dea140373e
SHA5120b981baa9f5156349b150dc7e3e2da73eda3a69e660eb2e81933ebaa2dc8af205ee21b8cc464bab09bd6cc3e13c06b06464db89a36c79b7e49155c349eb7e3e6
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1344-24-0x0000000074D30000-0x00000000754E0000-memory.dmpFilesize
7.7MB
-
memory/1344-19-0x00000000065C0000-0x00000000065CA000-memory.dmpFilesize
40KB
-
memory/1344-17-0x0000000074D30000-0x00000000754E0000-memory.dmpFilesize
7.7MB
-
memory/1344-14-0x0000000074D30000-0x00000000754E0000-memory.dmpFilesize
7.7MB
-
memory/4592-7-0x0000000074D3E000-0x0000000074D3F000-memory.dmpFilesize
4KB
-
memory/4592-0-0x0000000074D3E000-0x0000000074D3F000-memory.dmpFilesize
4KB
-
memory/4592-6-0x0000000006510000-0x0000000006522000-memory.dmpFilesize
72KB
-
memory/4592-8-0x0000000074D30000-0x00000000754E0000-memory.dmpFilesize
7.7MB
-
memory/4592-5-0x00000000057B0000-0x0000000005816000-memory.dmpFilesize
408KB
-
memory/4592-4-0x0000000074D30000-0x00000000754E0000-memory.dmpFilesize
7.7MB
-
memory/4592-3-0x0000000005710000-0x00000000057A2000-memory.dmpFilesize
584KB
-
memory/4592-16-0x0000000074D30000-0x00000000754E0000-memory.dmpFilesize
7.7MB
-
memory/4592-2-0x0000000005C20000-0x00000000061C4000-memory.dmpFilesize
5.6MB
-
memory/4592-1-0x0000000000C80000-0x0000000000CEC000-memory.dmpFilesize
432KB